* Thomas Roessler ([EMAIL PROTECTED]) [000128 09:57]:
> > Why not simply list all the matching keys, and then let the user
> > choose one of those, and then let gpg do the valitify check on
> > it's own?
>
> First of all, it may quite well be possible that there is a unique
> key matching an e-mail address with a fully valid user id to key
> association. In this case, there is no need to ask the user.
True, never actually seen it happen tho :)
> Then, the software should tell the user about the validity of the
> keys it presents to him.
GPG will do that for you. And in any case, you should not do a validity
check until *after* the user have selected which key to use.
> > How about DSS/DH? 95% of the keys around are DSS/DH keys.
>
> I don't need 99.999% or so of the keys around. Fortunately, most of
> those people I communicate with using PGP belong to the 5% of PGP
> users having RSA keys.
>
> (For the rest, I keep copies of pgp5 and gpg around.)
Sounds good.
Terje Elde
--
Xlehveh rhkau fudwuh få mydtemi dåh tk aqd rhkau jyt få kdyn (jyt ==
fudwuh?)